An Introduction to Internet Governance (4th edition)

Page 84

Internet Governance 49

AfrISPA (2002) The halfway proposition: Background paper on reverse subsidy of G8 countries by African ISPs, presented at the Conference of African Ministers of Finance, Planning and Economic Development, Johannesburg, South Africa, 19 October 2002. Available at: http://www.wougnet.org/WSIS/ug/WSIS2005/docs/ HalfwayProposition_Draft4.pdf

50

For a comprehensive survey of interconnection costs, see: Esmat B, Fernandez J (2006) International Internet Connections Costs, in Drake WJ (2006) Reforming Internet Governance: Perspectives from the Working Group on Internet Governance (WGIG). WGIG: New York, NY, USA, pp. 73–86. Available at: http://www.wgig.org/book-Launch.html

51

You can find a comprehensive analysis of the topic in Jensen M (2005) Interconnection Costs. APC: Melville, South Africa. Available at: http://www.apc.org/en/pubs/issue/ accessibility/all/interconnection-costs

52

Huston (2005) op. cit. pp. 7–9.

53

One of the limitations of negotiating this issue between governments is that most interconnection agreements are concluded between private telecommunication operators. They are often confidential.

54

ACLU White paper (ND) No competition: How monopoly control of the broadband Internet threatens free speech. ACLU: New York, NY, USA.

55

For more information on the ITU Global Cybersecurity Agenda, see: http://www.itu.int/ osg/csd/cybersecurity/gca/

56

The convention text is available at: http://conventions.coe.int/Treaty/en/Treaties/ Html/185.htm

57

The official name of these instruments is the Mutual Legal Assistance in Criminal Matters Treaties (MLATs).

58

The Clipper approach was proposed by the US government back in 1993. At its core was the use of a Clipper chip which was supposed to be used in all telephones and other voice communication tools. The Clipper chip had a ‘back door’ which could be used by governments for lawful surveillance. After strong opposition from human rights activists and the general public, the US government dropped this proposal in 1995. See: Denning D (1995) The case for clipper. MIT Technology Review. MIT: Cambridge, MA, USA. Available at: http://encryption_policies.tripod.com/us/denning_0795_clipper.htm

59

More references to Can-Spam are available at: http://www.ftc.gov/bcp/edu/pubs/ business/ecommerce/bus61.shtm

60

The Contact Network of Spam Enforcement Authorities (CNSA) was established in February 2005 by 13 EU countries (France, Austria, Belgium, Cyprus, the Czech Republic, Denmark, Greece, Ireland, Italy, Lithuania, Malta, the United Kingdom, and Spain). It aims to promote both cooperation among these states and coordination with entities outside the EU, such as the OECD and ITU.

61

European Commission, Information Society (2010). Unsolicited communication: fighting spam. Available at: http://ec.europa.eu/information_society/policy/ecomm/todays_ framework/privacy_protection/spam/index_en.htm

78


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.